Free Speech and Hostile Environments

Total Page:16

File Type:pdf, Size:1020Kb

Free Speech and Hostile Environments Reprinted from 99 Columbia L. Rev. (1999). Copyright Jack M. Balkin 1999. All rights reserved. FREE SPEECH AND HOSTILE ENVIRONMENTS J.M. Balkin* One major concern about sexual harassment law is that employers will restrict employee speech in order to avoid hostile environment liability, thus violating free speech principles. In this Essay, Professor Balkin argues that this “collateral censorship” is constitutionally permissible when there are good grounds for vicarious liability. Because employers actively control workplace culture, and because they are better able to prevent hostile environments than individual employees, vicarious liability for employee speech is more justified than in the case of distributors or common carriers. Professor Balkin also argues that captive audience doctrine, generally thought to apply only to speech in the home, is actually better suited to workplace speech. Hostile environments are a method of sex discrimination that maintains gender segregation; a hostile environment does its work precisely through making the employee a captive audience. The Essay concludes that First Amendment challenges to sexual harassment law should not become a defense of employer prerogatives presented in the guise of worker liberties. Without the incentives created by sexual harassment law, employees will not be freed from censorship; they will simply be remitted to the economic and social control of employers. Does sexual harassment law conflict with the First Amendment? A number of commentators now argue that it does.1 Generally, these * Knight Professor of Constitutional Law and the First Amendment, Yale Law School. My thanks to Bruce Ackerman, Akhil Amar, Ian Ayres, Dan Kahan, Sandy Levinson, Vicki Schultz, Reva Siegel, and Eugene Volokh for their comments on previous drafts. 1. See, e.g., Kingsley R. Browne, Title VII as Censorship: Hostile-Environment Harassment and the First Amendment, 52 Ohio St. L.J. 481, 548 (1991) [hereinafter Browne, Title VII as Censorship]; Kingsley R. Browne, Workplace Censorship: A Response to Professor Sangree, 47 Rutgers L. Rev. 579, 580–85 (1995); Jules B. Gerard, The First Amendment in a Hostile Environment: A Primer on Free Speech and Sexual Harassment, 68 Notre Dame L. Rev. 1003, 1033–34 (1993); Eugene Volokh, Freedom of Speech and Workplace Harassment, 39 UCLA L. Rev. 1791, 1846 (1992) [hereinafter Volokh, Freedom of Speech]; Eugene Volokh, How Harassment Law Restricts Free Speech, 47 Rutgers L. Rev. 563, 567 (1995) [hereinafter Volokh, How Harassment]; Eugene Volokh, What Speech Does “Hostile Work Environment” 1 2 FREE SPEECH AND HOSTILE ENVIRONMENTS objections focus on employer liability for speech by employers and employees that creates hostile environments. Virtually no one finds fault with regulating quid pro quo sexual harassment: Employers who tell employees “sleep with me or you’re fired” make threats that are not protected by the First Amendment.2 In this Essay I offer an account of why hostile environment doctrine, properly interpreted, does not violate freedom of speech.3 I address two basic kinds of objections. The first concedes that the creation of a hostile environment is not protected speech, but argues that fear of Title VII liability will lead employers to censor employee speech and that this chilling effect violates the First Amendment.4 I hope to show why these concerns are overstated through a discussion of the idea of collateral censorship—an important but largely overlooked concept in the theory of free speech. Collateral censorship occurs when A censors B out of fear that the government will hold A liable for the effects of B’s speech. I believe that the question of when collateral censorship is a permissible effect of regulation and when it is unconstitutional will be increasingly important in the law of telecommunications and cyberspace. In this case, however, the concept of collateral censorship helps us understand the constitutionality of hostile environment law. The second, and more radical attack on hostile environment liability argues that when employers create a hostile environment that materially alters working conditions to the disadvantage of women and minorities, they are engaged in protected speech.5 Rebutting this more radical attack helps us understand another important but undertheorized category in First Amendment law— Harassment Law Restrict?, 85 Geo. L.J. 627, 647 (1997) [hereinafter Volokh, What Speech]. 2. See, e.g., Nadine Strossen, The Tensions Between Regulating Workplace Harassment and the First Amendment: No Trump, 71 Chi.-Kent L. Rev. 701, 704 (1995) (“Even the most diehard free speech absolutist recognizes that the speech involved in quid pro quo harassment is tantamount to threats or extortion.”); Volokh, Freedom of Speech, supra note 1, at 1800 (quid pro quo harassment is no more protected than “any other form of threat or extortion”). 3. In this Essay I shall primarily be concerned with sexual harassment, and, to a lesser extent, racial harassment. I do not discuss religious harassment. I think that accusations of religious harassment often raise distinctive problems. For example, some employees might object to proselytization by co-workers or provocative displays of religious paraphernalia. Although both of these can undoubtedly make workers feel uncomfortable, neither is the precise equivalent of racist and sexist speech designed to drive blacks and women from the workplace. The rules that govern these situations must be tailored to take these differences into account. 4. See, e.g., Browne, Title VII as Censorship, supra note 1, at 505, 510–13, 548; Volokh, Freedom of Speech, supra note 1, at 1809–14; Volokh, What Speech, supra note 1, at 635–37. 5. See, e.g., Browne, Title VII as Censorship, supra note 1, at 544–47. For related reasons, Eugene Volokh argues that hostile environment law should be limited to face-to-face verbal harassment directed at particular individuals. See Volokh, Freedom of Speech, supra note 1, at 1846. This implies that other forms of communicative harassment, even if they materially alter working conditions to the disadvantage of women and minorities, are protected speech and may not be limited on the basis of content, viewpoint, or subject matter. See id. at 1849. FREE SPEECH AND HOSTILE ENVIRONMENTS 3 captive audience doctrine. It also helps connect the captive audience doctrine more closely to what I regard to be the deeper purposes of antidiscrimination law. I. COLLATERAL CENSORSHIP Although threats are not protected by the First Amendment, hostile environments do not always involve threats. A hostile environment is made up of individual acts of discriminatory speech and other conduct by all the persons who inhabit a workplace, including managers, employees, and even occasionally clients and customers. In hostile environments, “the workplace is permeated with ‘discriminatory intimidation, ridicule, and insult’ that is ‘sufficiently severe or pervasive to alter the conditions of the victim’s employment and create an abusive working environment . .’”6 Some of this behavior may be directed at particular employees; other elements may be directed at no one in particular but may help foster an abusive environment. Even if individual acts do not constitute a hostile environment separately, they can be actionable when taken together. The test is whether the conduct, taken as a whole, would lead to an environment that the employee reasonably perceives as abusive.7 Employers can be liable for maintaining a hostile work environment even if management did not personally engage in any of the predicate acts. In Burlington Industries, Inc. v. Ellerth8 and Faragher v. City of Boca Raton,9 the Supreme Court held that employers are liable for harassment by supervisory personnel, subject to a number of affirmative defenses where the harassment did not result in a tangible employment action like firing or demotion.10 6. Harris v. Forklift Sys., Inc., 510 U.S. 17, 21 (1993) (quoting Meritor Sav. Bank v. Vinson, 477 U.S. 57, 65, 67 (1986)). 7. See Harris, 510 U.S. at 21–23. 8. 524 U.S. 742 (1998). 9. 524 U.S. 775 (1998). 10. The Supreme Court’s current doctrine is that [a]n employer is subject to vicarious liability to a victimized employee for an actionable hostile environment created by a supervisor with immediate (or successively higher) authority over the employee. When no tangible employment action is taken, a defending employer may raise an affirmative defense to liability or damages, subject to proof by a preponderance of the evidence. The defense comprises two necessary elements: (a) that the employer exercised reasonable care to prevent and correct promptly any sexually harassing behavior, and (b) that the plaintiff employee unreasonably failed to take advantage of any preventive or corrective opportunities provided by the employer or to avoid harm otherwise. While proof that an employer had promulgated an anti-harassment policy with complaint procedure is not necessary in every instance as a matter of law, the need for a stated policy suitable to the employment circumstances may appropriately be addressed in any case when litigating the first element of the defense. And while proof that an employee failed to fulfill the corresponding obligation of reasonable care to avoid harm is not limited to showing any 4 FREE SPEECH AND HOSTILE ENVIRONMENTS The degree of vicarious liability for non-supervisory personnel (such as co-workers) is still contested, but currently most courts hold an employer liable if the employer knew or should have known of the harassment and did not take prompt corrective action.11 Employers who want to minimize hostile environment liability cannot merely prohibit individual instances of harassing conduct. They must also limit conduct that might, in combination with other conduct, contribute to a hostile environment. Hence employers are tempted to create prophylactic rules against all the potential components of a hostile environment. Some of these will be unwelcome physical advances, assaults, and forms of abuse. Others will be largely verbal: sexual jokes and innuendoes, taunts and threats, sexually oriented cartoons, pictures, and pornography.
Recommended publications
  • How Law Made Silicon Valley
    Emory Law Journal Volume 63 Issue 3 2014 How Law Made Silicon Valley Anupam Chander Follow this and additional works at: https://scholarlycommons.law.emory.edu/elj Recommended Citation Anupam Chander, How Law Made Silicon Valley, 63 Emory L. J. 639 (2014). Available at: https://scholarlycommons.law.emory.edu/elj/vol63/iss3/3 This Article is brought to you for free and open access by the Journals at Emory Law Scholarly Commons. It has been accepted for inclusion in Emory Law Journal by an authorized editor of Emory Law Scholarly Commons. For more information, please contact [email protected]. CHANDER GALLEYSPROOFS2 2/17/2014 9:02 AM HOW LAW MADE SILICON VALLEY Anupam Chander* ABSTRACT Explanations for the success of Silicon Valley focus on the confluence of capital and education. In this Article, I put forward a new explanation, one that better elucidates the rise of Silicon Valley as a global trader. Just as nineteenth-century American judges altered the common law in order to subsidize industrial development, American judges and legislators altered the law at the turn of the Millennium to promote the development of Internet enterprise. Europe and Asia, by contrast, imposed strict intermediary liability regimes, inflexible intellectual property rules, and strong privacy constraints, impeding local Internet entrepreneurs. This study challenges the conventional wisdom that holds that strong intellectual property rights undergird innovation. While American law favored both commerce and speech enabled by this new medium, European and Asian jurisdictions attended more to the risks to intellectual property rights holders and, to a lesser extent, ordinary individuals.
    [Show full text]
  • No Monitoring Obligations’ the Death of ‘No Monitoring Obligations’ a Story of Untameable Monsters by Giancarlo F
    The Death of ‘No Monitoring Obligations’ The Death of ‘No Monitoring Obligations’ A Story of Untameable Monsters by Giancarlo F. Frosio* Abstract: In imposing a strict liability regime pean Commission, would like to introduce filtering for alleged copyright infringement occurring on You- obligations for intermediaries in both copyright and Tube, Justice Salomão of the Brazilian Superior Tribu- AVMS legislations. Meanwhile, online platforms have nal de Justiça stated that “if Google created an ‘un- already set up miscellaneous filtering schemes on a tameable monster,’ it should be the only one charged voluntary basis. In this paper, I suggest that we are with any disastrous consequences generated by the witnessing the death of “no monitoring obligations,” lack of control of the users of its websites.” In order a well-marked trend in intermediary liability policy to tame the monster, the Brazilian Superior Court that can be contextualized within the emergence of had to impose monitoring obligations on Youtube; a broader move towards private enforcement online this was not an isolated case. Proactive monitoring and intermediaries’ self-intervention. In addition, fil- and filtering found their way into the legal system as tering and monitoring will be dealt almost exclusively a privileged enforcement strategy through legisla- through automatic infringement assessment sys- tion, judicial decisions, and private ordering. In multi- tems. Due process and fundamental guarantees get ple jurisdictions, recent case law has imposed proac- mauled by algorithmic enforcement, which might fi- tive monitoring obligations on intermediaries across nally slay “no monitoring obligations” and fundamen- the entire spectrum of intermediary liability subject tal rights online, together with the untameable mon- matters.
    [Show full text]
  • Free Speech in the Algorithmic Society: Big Data, Private Governance, and New School Speech Regulation
    Free Speech in the Algorithmic Society: Big Data, Private Governance, and New School Speech Regulation Jack M. Balkin* TABLE OF CONTENTS INTRODUCTION ................................................................................. 1151 I. BIG DATA IS SOYLENT GREEN ................................................. 1154 A. Technology Mediates (and Constitutes) Relationships of Power Between People ..................................................... 1157 B. Information Fiduciaries ................................................... 1160 C. Algorithmic Nuisance ...................................................... 1163 D. Personal Robots ............................................................... 1168 II. NEW SCHOOL SPEECH REGULATION AND PRIVATE GOVERNANCE ......................................................................... 1172 A. The Right to Be Forgotten and the Problem of Fake News 1172 B. New School Speech Regulation ......................................... 1173 1. Collateral Censorship ............................................... 1176 2. Digital Prior Restraint............................................... 1177 C. Public Private Cooperation/Cooptation ............................ 1179 III. PRIVATE GOVERNANCE ........................................................... 1182 A. From Game Gods to Social Media .................................... 1184 B. From the Dyadic to the Pluralist Model of Speech Governance ..................................................................... 1186 C. Problems of the New System of
    [Show full text]
  • Collateral Censorship and the Limits of Intermediary Immunity Felix T
    Notre Dame Law Review Volume 87 | Issue 1 Article 6 11-1-2011 Collateral Censorship and the Limits of Intermediary Immunity Felix T. Wu Follow this and additional works at: http://scholarship.law.nd.edu/ndlr Recommended Citation Felix T. Wu, Collateral Censorship and the Limits of Intermediary Immunity, 87 Notre Dame L. Rev. 293 (2013). Available at: http://scholarship.law.nd.edu/ndlr/vol87/iss1/6 This Article is brought to you for free and open access by NDLScholarship. It has been accepted for inclusion in Notre Dame Law Review by an authorized administrator of NDLScholarship. For more information, please contact [email protected]. COLLATERAL CENSORSHIP AND THE LIMITS OF INTERMEDIARY IMMUNITY Felix T. Wu* The law often limits the liability of an intermediaryfor the speech it carries. And rightly so, because imposing liability on intermediaries can induce them to filter out questionable content and this "collateralcensorship" risks suppressing much lawful, even highly beneficial, speech. The "collat- eral censorship" rationale has its limits, though, and correspondingly, so should the applicability of intermediary immunity. The worry with collateral censorship is not just that intermediaries censor, but that they censor more than an original speaker would in the face of potential liability. Increased censorship, in turn, is the product of applying liability targeted at original speakers to entities whose interests divergefrom original speakers. Where the "intermediary" has the interests of an original speaker, and so should be regarded as one, or where the form of liability already takes into account the intermediary's interests, collateral censorship is not the problem, and immu- nity is not the right response.
    [Show full text]
  • Automation in Moderation
    Texas A&M University School of Law Texas A&M Law Scholarship Faculty Scholarship 3-2020 Automation in Moderation Hannah Bloch-Wehba Texas A&M University School of Law, [email protected] Follow this and additional works at: https://scholarship.law.tamu.edu/facscholar Part of the First Amendment Commons, Intellectual Property Law Commons, Internet Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Hannah Bloch-Wehba, Automation in Moderation, 53 Cornell Int'l L.J. 42 (2020). Available at: https://scholarship.law.tamu.edu/facscholar/1448 This Article is brought to you for free and open access by Texas A&M Law Scholarship. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Texas A&M Law Scholarship. For more information, please contact [email protected]. \\jciprod01\productn\C\CIN\53-1\CIN102.txt unknown Seq: 1 8-DEC-20 17:23 Automation in Moderation Hannah Bloch-Wehba† Introduction ..................................................... 42 R I. The Origins of Automation in Moderation ................ 48 R A. Immunity, Safe Harbor & Private Governance ......... 48 R B. Spam Filtering ........................................ 52 R 1. “Artificial Intelligence” ............................. 54 R C. Unlawful Content ..................................... 57 R D. Copyright Enforcement................................ 62 R II. From Reactive to Proactive................................ 66 R A. Copyright ............................................ 66 R B. Unlawful Speech ...................................... 69 R C. Defamation ........................................... 72 R III. The Drawbacks of Proactive Moderation .................. 74 R A. Content Moderation as Censorship .................... 75 R B. Content Moderation as Surveillance ................... 79 R C. Content Moderation as Algorithmic Control ............ 81 R D. Content Moderation as Power ......................... 85 R E. Content Moderation as Extraterritorial Governance....
    [Show full text]
  • Beyond Gatekeeping: the Normative Responsibility of Internet Intermediaries
    Vanderbilt Journal of Entertainment & Technology Law Volume 18 Issue 4 Issue 4 - Summer 2016 Article 4 2016 Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries Marcelo Thompson Follow this and additional works at: https://scholarship.law.vanderbilt.edu/jetlaw Part of the Law Commons Recommended Citation Marcelo Thompson, Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries, 18 Vanderbilt Journal of Entertainment and Technology Law 783 (2020) Available at: https://scholarship.law.vanderbilt.edu/jetlaw/vol18/iss4/4 This Article is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Journal of Entertainment & Technology Law by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries Marcelo Thompson* ABSTRACT This Article puts forward a normative approach to the responsibility of Internet intermediaries for third-party content they host. It argues that, in thinking about intermediary liability, the focus should be on intermediaries' responsibility towards the reasoning processes in reaching decisions, rather than on the outcomes of intermediaries'decisions.What is necessary is a framework that, while attaching responsibilities to such decisions, creates a cushioning system for their decision making, mitigating the hardship of honest mistakes. Within this framework, intermediaries must be seen not as mere keepers of gates, but as designers of artifacts whose use plans settle normative questions and play a vital role in the construction of our normative reality. Accordingly, an interpretive commitment must be required toward the integrity of such a reality.
    [Show full text]
  • How India Censors The
    How India Censors the Web Kushagra Singh∗ Gurshabad Grover∗ Varun Bansal Centre for Internet and Society Centre for Internet and Society Centre for Internet and Society [email protected] [email protected] [email protected] ABSTRACT First, the regulations do not mandate ISPs to use specific filter- One of the primary ways in which India engages in online censor- ing mechanisms. Thus, ISPs are are at liberty to employ various ship is by ordering Internet Service Providers (ISPs) operating in its technical methods [47]. jurisdiction to block access to certain websites for its users. This pa- Second, website-blocking orders, especially those issued by the per reports the different techniques Indian ISPs are using to censor Government, are rarely available in the public domain. ISPs are, in websites, and investigates whether website blocklists are consistent fact, mandated by regulations to maintain confidentiality of cer- across ISPs. We propose a suite of tests that prove more robust than tain website-blocking orders issued by the Government [3].Various previous work in detecting DNS and HTTP based censorship. Our attempts by researchers and advocacy organisations to obtain the tests also discern the use of SNI inspection for blocking websites, complete list of blocked websites have failed [4, 24]. which is previously undocumented in the Indian context. Using Third, the whimsy of ISPs and the Government aggravates these information from court orders, user reports and government orders, problems. Despite strict net neutrality regulations in India that we compile the largest known list of potentially blocked websites in prohibit ISPs from arbitrarily restricting access to websites [35], India.
    [Show full text]
  • Leiden University Law School
    Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression A Report by Students at Leiden Law School Written by Niamh Coghlan, Amalia Flenga, Carola Gioco, Lindsay McCosh, Flavia Mencarini, Guilherme Migliora, Melanie Moulder, Ona Lorda Roure, Uditi Saha, Agnese Soverini, and Ruoxin Su with Dr Mark Leiser, Leiden Law School Purpose: To inform the Special Rapporteur’s annual thematic report presented to the Human Rights Council at its 47th session in June 2021 Report on Disinformation 1 Leiden Law School Executive summary: 1. This report identifies the main challenges posed by disinformation. It analyses the impact of measures adopted by States as well as platforms to combat this phenomenon. Based on the findings of our research, the report provides a series of recommendations to the Special Rapporteur. 2. Disinformation has consequences for both individuals and society. Identified issues include population control, loss of consumer protection, as well as increasing democratic deficits and discriminatory practices. 3. States have deployed various strategies to counterbalance the negative effects of disinformation. Some have used ‘command-and-criminality' methods to punish those spreading disinformation. Often these come with disproportionate penalties. Others have launched official programmes that include platforms monitoring or using independent organizations to debunk misleading online news and information. If abused, however, these measures can encroach basic human rights like freedom of expression, the right to liberty and security, etc.. These measures can also hamper the work of journalists and the public’s right to access information. 4. The report highlights both legal provisions and guidance at the international and regional levels addressing human rights abuses arising from far-reaching and over broad measures countering disinformation.
    [Show full text]
  • JS., SL, and LC V. Village Voice Media Holdings
    NOTICE: SLIP OPINION (not the court’s final written decision) The opinion that begins on the next page is a slip opinion. Slip opinions are the written opinions that are originally filed by the court. A slip opinion is not necessarily the court’s final written decision. Slip opinions can be changed by subsequent court orders. For example, a court may issue an order making substantive changes to a slip opinion or publishing for precedential purposes a previously “unpublished” opinion. Additionally, nonsubstantive edits (for style, grammar, citation, format, punctuation, etc.) are made before the opinions that have precedential value are published in the official reports of court decisions: the Washington Reports 2d and the Washington Appellate Reports. An opinion in the official reports replaces the slip opinion as the official opinion of the court. The slip opinion that begins on the next page is for a published opinion, and it has since been revised for publication in the printed official reports. The official text of the court’s opinion is found in the advance sheets and the bound volumes of the official reports. Also, an electronic version (intended to mirror the language found in the official reports) of the revised opinion can be found, free of charge, at this website: https://www.lexisnexis.com/clients/wareports. For more information about precedential (published) opinions, nonprecedential (unpublished) opinions, slip opinions, and the official reports, see https://www.courts.wa.gov/opinions and the information that is linked there. This opinion was fll~. r r~ /F·I-I:E\ at B tao fl1'Vl on ph ~~c ts- IN CLERKS OFFICE IUPReMe COURT, STATE OF W«\SSII«mltf DATE SEP 0 3 2Q15 .
    [Show full text]
  • Free Speech Anupam Chander  and Uyên P
    A3_CHANDER.DOCX (DO NOT DELETE) 12/15/2014 3:29 PM Free Speech Anupam Chander and Uyên P. Lê ABSTRACT: When civic engagement is increasingly mediated online, the law regulating cyberspace becomes the law regulating speech. Yet, free speech texts and free speech theorists pay scant attention to the ways that cyberlaw configures the principal mechanism for exercising free speech rights today— communication online. Conversely, while many have long observed that the Internet enables speech, scholars have failed to recognize the role that the First Amendment played in configuring the law of cyberspace. A strong normative commitment to free speech helped clear the legal hurdles for the development of history’s most powerful platforms for speech. Because of law, speech became free—free as in speech, and free as in beer. This is the First Amendment/ Cyberlaw Dialectic: the First Amendment constituted cyberlaw, and cyberlaw, in turn, constituted free speech. But this moment of free speech is fragile, threatened by mass electronic surveillance, mega-trade treaties with ever stricter intellectual property protections, and criminal copyright law. How we approach such issues will determine the extent of government censorship, private third-party censorship, and even self-censorship and sousveillance. The future of free speech hangs in the balance. Professor of Law, University of California, Davis; B.A., Harvard University; J.D., Yale Law School. Free Speech and Technology Fellow, University of California, Davis; B.A., Yale University; J.D., University of California, Davis. We thank Vik Amar, Ashutosh Bhagwat, Ken Bamberger, Alan Brownstein, Michael Froomkin, Jerry Kang, Carlton Larson, Vincent Polley, Saikrishna Prakash, Derek Slater, Madhavi Sunder, and William Wang, and the Berkeley law faculty, as well as the participants of a Berkeley law faculty workshop and Zachary Sanderson and other editors of the Iowa Law Review, for very helpful comments.
    [Show full text]
  • Platform Liability in the EU: a Need for Reform? 2020
    Platform Liability in the EU: A Need for Reform? 2020 3(53) Platform Liability in the EU: A Need for Reform? Table of Contents Definitions ................................................................................................. 4 1 Executive summary ........................................................................... 5 2 Introduction ....................................................................................... 7 2.1 The purpose of the report ............................................................ 8 2.2 Method ........................................................................................ 8 2.3 Overview ..................................................................................... 8 2.4 The context of the report ............................................................. 9 2.4.1 Platforms and the internal market ....................................... 9 2.4.2 Platforms and sustainable development ............................ 10 3 The regulatory framework for platform content liability in the EU 11 3.1 The e-Commerce Directive ....................................................... 11 3.2 The Copyright Directive (2019) ............................................... 14 3.3 The Audiovisual Media Services Directive (2018) .................. 15 3.4 The relationship and consistency between the directives ......... 16 3.5 Self-regulation .......................................................................... 17 4 A further harmonised framework for platform liability in the EU .. 19 4.1 Evidence
    [Show full text]
  • Countering Online Hate Speech Through Legislative Measure: The
    COUNTERING ONLINE HATE SPEECH THROUGH LEGISLATIVE MEASURE: THE ETHIOPIAN APPROACH IN A COMPARATIVE PERSPECTIVE by Temelso Gashaw LLM/MA Capstone Thesis SUPERVISOR: Professor Jeremy Mcbride Central European University © Central European University CEU eTD Collection 5th of June 2020 Abstract It is almost self-evident that the phenomenon of online hate speech is on the rise. Meanwhile, governments around the world are resorting to legislative measures to tackle this pernicious social problem. This Capstone thesis has sought to offer an overview of the legislative responses to online hate speech in four different jurisdictions and unravel their implication on the right to freedom of expression. Using a comparative methodology, the research describes how the regulation of social networking platforms in relation to hate speech is being approached by the Council of Europe, German, the United States of America and Federal Democratic Republic of Ethiopia. It tests the hypothesis that legal frameworks for moderation of user-generated online content can have a more detrimental effect for freedom of speech in semi-democratic countries like Ethiopia than in developed liberal democracies. Findings of this project regarding the recently enacted Ethiopian Hate Speech and Disinformation Prevention proclamation will offer some guidance for The Council of Ministers in the course of adopting implementing regulation. CEU eTD Collection i Table of Contents Abstract .....................................................................................................................................
    [Show full text]